Submitted By: Douglas R. Reno Date: 2025-04-14 Initial Package Version: 42.1 Origin: Patch submitted to upstream by reporter Upstream Status: Pending (Issue #221 in the yelp repository) Description: Fixes a security vulnerability that allows for yelp to arbitrary exfiltrate files from a system when loading a help document. This is caused by arbitrary JavaScript execution, and a proof of concept exploit is now public that exfiltrate's a user's OpenSSH private key. The CVE number for this vulnerability is CVE-2025-3155. Upstream has been aware of this for a while and the reporter of the vulnerability provided patches, though the Yelp/yelp-xsl maintainers have not fixed it yet. A GNOME Security Team representative has recommended using the reporter's patches though as it is *not* advisable to skip patching this vulnerability. The patches in yelp-xsl and yelp add a Content Security Policy (CSP) preventing JavaScript execution through help documents. diff --git a/xslt/common/html.xsl b/xslt/common/html.xsl index 77aed075..82832fb4 100644 --- a/xslt/common/html.xsl +++ b/xslt/common/html.xsl @@ -266,6 +266,16 @@ certain tokens, and you can add your own with {html.sidebar.mode}. See --> + +